• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Adaptive output regulation for cyber-physical systems under time-delay attacks

    2022-03-02 06:46:10DanJinBoChenLiYuShichaoLiu
    Control Theory and Technology 2022年1期

    Dan Jin·Bo Chen·Li Yu·Shichao Liu

    Abstract In this paper,we present an output regulation method for unknown cyber-physical systems(CPSs)under time-delay attacks in both the sensor-to-controller(S-C)channel and the controller-to-actuator(C-A)channel.The proposed approach is designed using control inputs and tracking errors which are accessible data.Reinforcement learning is leveraged to update the control gains in real time using policy or value iterations.A thorough stability analysis is conducted and it is found that the proposed controller can sustain the convergence and asymptotic stability even when two channels are attacked. Finally, comparison results with a simulated CPS verify the effectiveness of the proposed output regulation method.

    Keywords Adaptive output regulation·Cyber-physical systems·Time-delay attacks·Reinforcement learning

    1 Introduction

    Cyber-physical systems(CPSs)integrate computation,communication and control to achieve the desired performance of physical processes[1].CPSs have been implemented in a wide range of applications such as industrial manufactures[2],smart grids[3],transportation networks[4],health and medicine[5].However,the integration of computation,communication and control in turn makes CPSs vulnerable to cyber attacks[6].In recent years,the number of CPS security incidents has increased rapidly[7],and some incidents have caused critical damages to the infrastructures such as Stuxnet in Iraq[8]and BlackEnergy in Ukraine.Therefore,it is vital to innovate the security of CPSs.

    Many security problems come from cyber attacks.Timedelay attacks [9–11], as one kind of cyber attacks, tamper with temporal characteristics of the communication channels and lead to signal delays in certain network nodes[12].Being different from DoS attacks, time-delay attacks are less costly and harder to be detected [13–15], due to the fact that time-delay attackers only need to occupy part of the channel without blocking the whole transmission. At the same time, time-delay attacks are easier to be implemented technically than deception attacks[16–18],as there is no need for time-delay attackers to capture and tamper the information. Furthermore, though time-delay attacks cause the transmitted information to be delayed, it is different fromnetwork-induceddelays.Thisisbecauseattack-induced delays are destructive and the instantaneous fluctuations of delays can be very large.If attack-induced delays cannot be handled well, they may affect the normal operation of the system seriously,especially for the CPSs with high real-time requirements. Therefore, it is crucial to address the timedelay attacks in CPSs.

    In the existing works,several approaches have been proposed to deal with delays in CPSs, including the random method[19,20],the robust method[21,22],and the switched system method[23,24].Though delays can be handled well with these methods, most of the works require the exact knowledge of the system model.Recently,model-free methods have been increasingly designed in the field of control[25–32]. Reinforcement learning (RL) [33], which learns the optimal behaviors by observing the responses from the environment to sub-optimal control policies [34], has a great advantage in solving model-free problems. Adaptive dynamic programming (ADP), as an important branch of RL[35],is an effective method in solving the optimal control problem.For example,the RL and ADP methods were adopted in[25–27]to solve the optimal control problems for unknown linear systems. In these work, they addressed the delays of one channel,constant delays of multi-channels,and time-varying delays of multi-channels, respectively. While measurements were used to learn the optimal controllers in these works, disturbance rejection was not considered.Securing the control issue of unknown CPSs with actuator attacks and unmatched perturbation was addressed in [35].Although a model-free ADP algorithm was designed, the neural networks were introduced to approximate the value function and the identification error was added in the process of designing. The robust resilient control problem of the nonlinear system under actuator attacks was addressed in[32]by ADP techniques,although the system was partially unknown.Furthermore,the ADP method was also applied to solve the attack scheduling problem [36], the fault-tolerant problem[37]or privacy protection problem[38].However,to the best knowledge of the authors,there are few work on securing unknown CPSs against time-delay attacks.

    Based on the aforementioned analysis, the adaptive output regulation problem for unknown CPSs under time-delay attacks in the S-C channel and the C-A channel is considered in this paper. A measurement feedback controller is designed only using control inputs and tracking errors.The model-free RL method is adopted to update the control gains online. Although the method of designing the controller is similar to the one in [25], the location of the delay is different, and attack-induced delays exist in two channels in our paper. Based on the measurement feedback controller,the closed-loop system could achieve both asymptotic tracking and disturbance rejection.The main contributions of this paper are summarized as follows.

    1) It is proved that the performance index with delays is still quadratic, and the regulation equations with delays are obtained, which can ensure the linear output regulation problem to be solvable.

    2)The measurement feedback controller can still realize the real-time closed-loop feedback control for the system,even though two channels suffer from time-delay attacks,and the tracking errors between the system outputs and the reference signals are asynchronous.

    The rest of this paper is organized as follows.The problem formulation is stated in Sect.2. In Sect. 3, a measurement feedback controller with unknown model knowledge is designed, and the convergence of algorithms together with tracking performance is analyzed.Finally,a simulation example and the conclusion are presented in Sects.4 and 5,respectively.

    Notations R denotes the set of all real numbers, Rndenotes then-dimensional Euclidean space, Rn×mdenotes the set of alln×mreal matrices.Iis the identity matrix.XTrepresents the transpose of the matrixX.X >(<)0 denotes a positive-definite (negative-definite) matrix,X≥(≤)0 denotes a non-negative definite(non-positive definite)matrix.σ(X)denotes the set of eigenvalues of the matrixX.vec(X)is a vectorization operator that stacks each column of the matrixXto a column vector.

    2 Problem formulation

    In this section,the model of the CPS under time-delay attacks is obtained,and the augmented error system with measurement data is established.Then,the optimal output regulation of the CPS is described.

    2.1 System model with attack-induced delays

    Consider the following discrete-time system with unknown parameters:

    whereE∈ Rq×qis an unknown Hurwitz matrix. This exosystem generates both the disturbanced(k)=Dr(k)and the reference signalw(k)=Fr(k)to the system.In fact,the exosystem is a description together with the disturbance and the reference signal,the specific origin of the system(1)and the exosystem(2)can be referred to the literature[39].In this paper,the reference signal is unknown and the tracking errore(k)∈R is the solely measurable output variable.Take the Internet of Vehicles as an example,the tracking errors can be measured by installing the sensors on the follower-cars,but the reference trajectory of the leader-car is unknown. Furthermore, according to the CPS structure shown in Fig. 1,when the system outputy(k)=Cx(k)and the control inputu(k)are sent to the controller and the actuator through communication networks,respectively,the S-C channel or C-A channel may suffer from the adversary time-delay attacks.The model of the time-delay attack can be described as

    whered1,k≥0 andd2,k≥0 are the attack-induced delays in the C-A channel and S-C channel,respectively.Due to the constraint of attacks’cost,the dwell time of attacks is finite,hence the attack-induced delays are assumed to be bounded reasonably,i.e.,

    Assumption 1 The delays induced by time-delay attacks are bounded.

    From Assumption 1,we have 0 ≤d1,k≤d1and 0 ≤d2,k≤d2,whered1andd2are the maximal attack-induced delays in the C-A channel and S-C channel,respectively.It should be mentioned that the reference signal can be transmitted through the network or not in practice. Here, the security issue is mainly addressed that the attack is launched in the feedback or forward channel of the system,and the system output tracks a given reference signal,i.e.,the attack to the reference signal is not considered.For uncertain delays,the robust method is adopted in this paper, and the bounds of attack-induced delays are utilized to design the controller,more details are explained in Remark 1.Basing on the bounds of the attack-induced delays, the model of the system (1)under attacks can be described as follows:

    Next, the measurement data will be used to reconstruct the system model under time-delay attacks.

    2.2 Augmented error system with measurement data

    Due to the unmeasurable system state, the controller cannot be designed using the state feedback directly. Thus, an indirect way is to utilize the measurement information and designameasurementfeedbackcontrollerbyestablishingthe relation between the system state and the measurement information. In addition, let us defineξ(k)= [xT(k),rT(k)]T,then it follows from (2) and (4) that the augmented error system is written as

    whereM1x∈Rn×nz,M1r∈Rq×nz,nz=2(n+q)+d1+d2.It follows from the above derivation thatξ(k+d1)traces back to the state ofξ(k-n-q-d2).Actually,the historical timek-n-q-d2can be extended to a general time pointk-N,as long asNis bigger thann+q+d2. From the similar derivation ofξ(k+d1)thatξ(k+d1-d2)has the following form:

    Fig.1 The frame of CPSs under attacks

    2.3 Linear output regulator

    For the linear output regulator problem,the control input can be expressed as the standard formu(k)=-K x(k)+(K X+U)r(k)[40],whereKis obtained by solving an algebraic riccati equation(ARE),whileXandUare obtained by solving regulator equations.Inspired by the standard form of the controller,the following measurement feedback controller will be designed in this paper:

    whereKsatisfies thatA-BKis a Schur matrix,X∈Rn×qandU∈Rm×qare obtained by solving the following regulator equations:

    SinceA-BKis a Schur matrix,one has limk→∞ˉx(k)=0,then,limk→∞ˉu(k)=0,limk→∞e(k)=0 by(13)and(14).From the above analysis, the linear output regulation problem can be solved by applying the measurement feedback controller(12).At the same time,the open-loop form of the system(14)can be expressed as

    How to find the optimal controller (12) for the system under time-delay attacks in both channels will be solved in this paper. Here, the optimality is achieved by minimizing a predefined performance index or value function,which is chosen as

    Remark 1The measurement feedback controller in this paper is designed according to the bounds of delaysd1andd2,which relate to the dimension of the controller gain. The designed controller is applied to the system where the attackinduced delays are less than the bounds, it means that the control components are redundant. In practice, this control scheme can be achieved through the time stamp at each data segment and a trigger which is introduced artificially in the control/actuator center.Take the S-C channel as an example,when the control center receives the data packet with time informationkat timek+d2,k(d2,k≤d2), the artificial trigger in the control center will not be trigged at once untilk+d2,and the data packet with time informationkwill be adopted atk+d2.If there are still other data packets arrived before the timek+d2,those packets will wait in the buffer.In this case,the proposed method can still deal with the case of time-varying delays.

    Remark 2In practice, it is usually hard to obtain an exact system model, making it much difficult to design a secure controller. Fortunately, RL, which learns what to do from the environment so as to maximize a numerical reward signal [33], is a very effective tool to develop a model-free approach to update the control policy (action) and the performance index (reward). Based on the control inputs and tracking errors, the RL method is developed to update the controller gain in this paper.

    3 Measurement feedback design with unknown model knowledge

    Inthissection,ameasurementfeedbackcontrollerisdesigned to solve the problem(17)with unknown system parametersA,B,C,D,unknown exosystem parametersE,F,unmeasurable system statex(k),exosystem stater(k),and only the control inputs and tracking errors are utilized.

    3.1 Controller design

    Before presenting the algorithms, the following Lemma on the value function is introduced.

    Lemma 1For the infinite-horizon output regulation problem,the reference signal is produced by the exosystem (2), then the value function(16)under any fixed stabilizing controller(13)can be expressed as

    whereK j+1=(R+BTPj B)-1BTPj Ais obtained iteratively by solving the optimization problem (17) with no time-delays, i.e.,d1=d2= 0, then the system (15) is reduced to

    Remark 3Notice that the ARE(30)is nonlinear,and much expensive computation is required to obtainP*. To reduce the computational cost, the policy iteration (PI) algorithm and the value iteration(VI)algorithm,which are two iterative algorithms in RL,are usually employed to approachP*approximately. When the time goes to infinity,PjandK jwill achieve toP*andK*with small neighborhoods,respectively. In this case,u*(k)=(-K*M1ˉx+U M1r)Z(k)=- ?K*Z(k), and it is equivalent to ˉu*(k-d1)= -K*ˉx(k).This implies that the measurement feedback controller can stabilize the system(15)in an optimal sense.

    Next,the measurement data will be used to learn the controller gain ?K*.Let

    Then,the online PI algorithm via the measurement feedback can be summarized by Algorithm1.

    images/BZ_27_915_802_950_838.png

    Note that the initial control policy needs to be admissible in the PI algorithm.To avoid the restriction,the VI algorithm is derived later.First,it is derived from(22)that

    whereΘ= [θT(k0-d1),...,θT(k0+s-d1)]T,Φj=[(φj(k0))T,...,(φj(k0+s))T]T. Then, the controller gain can be updated by

    Then,the online VI algorithm via the measurement feedback can be summarized by Algorithm2. The main differences between Algorithm 1 and Algorithm 2 are the requirement of the initial control policy and the convergence rate of the algorithm. If the initial control policy is admissible, Algorithm 1 can be chosen and its convergence rate is faster relatively than that of Algorithm 2.If the initial control policy is arbitrary, Algorithm 2 can be chosen, but the convergence rate of Algorithm2 will be slower relatively.

    Remark 4It is known from (26) and (35) that ?P∈R[2(n+q)+d1+d2+1]×[2(n+q)+d1+d2+1] is a symmetric matrix.To guarantee the application of the least square method,more than [2(n+q)+d1+d2+1]2/2 sample data should be collected before the learning process in Algorithm1 or Algorithm2.

    Remark 5As usual, a probing noise is added into the input in the process of collecting data,the purpose is that the system can be excited sufficiently and the data can be collected diversely. Furthermore, the rank condition of matricesΨ jandΘcan be satisfied easily. Notice that this condition is necessary when ?Pjis solved uniquely from(33)and(37)at each iteration.

    images/BZ_27_1852_1786_1888_1823.png

    3.2 Convergence and tracking performance analysis

    In this subsection,a rigorous proof is presented for the convergence of above algorithms,and the tracking performance is analyzed after an approximate optimal controller is applied to the system.

    Theorem 1The sequence{ ?Pj}and{ ?K j}obtained by Algorithm1 or Algorithm2 will converge to?P*and?K*as j→∞,where

    ProofFirst,consider the convergence of Algorithm1.The PI algorithm for solving the discrete-time ARE (30) had been presented in some literature such as [25–27], and the convergence was presented in[41].Particularly,Pjwas solved from

    Based on the convergent Algorithms, the next theorem illustrates that the approximate optimal controller obtained by Algorithm1 or Algorithm2 can make the system achieve asymptotic tracking,even in the case of external disturbance and time-delay attacks.

    Theorem 2The measurement feedback control policy u(kd1)= - ?K j*Z(k-d1) can stabilize the system (15) and guaranteelimk→∞e(k)=0.

    Since the sequence{K j}is convergent and the optimal controller gainK*can stabilize the system, i.e.,A-BK*is Schur. It implies that there is a small constant∈>0, and the neighborhood withK*as the centerδ∈(K*),then given any approximate optimal controller gainK j*∈δ∈(K*),it is satisfied thatA-BK j*is Schur.Hence,limk→∞ˉx(k)=0,which implies limk→∞e(k)=0.■

    Remark 6In Algorithm1 and Algorithm2,the initial control policies are used to generate system trajectories during the period of collecting data.In the period of learning,the estimation policyuj(k)= - ?K j Z(k)is updated by the collected data until certain precision of iterations is arrived. Hence,Algorithms1 and Algorithm2 are off-policy learning methods.

    Remark 7For any attack-induced delays, the measurement feedback controller can be obtained by the proposed algorithms so long as that enough historical data is collected and the correlated conditions are satisfied.In most practical systems,the delay in the system cannot be too large due to the constraint of attack cost. When the delay exceeds certain threshold,the information is usually discarded,and this case can be regarded as DoS attacks, which will be one of our future works.

    4 Simulation examples

    In this section, the mass–spring–damper system (Fig.2) in[43,44]is used to validate the effectiveness of the proposed algorithms. In Fig.2,M,Landcrepresent the mass of the object,the stiffness constant of the spring and the damping,respectively.Then,thedynamicsprocessofthemass–spring–damper system is modeled by

    Fig.2 Mass–spring–damper system

    The performance index is chosen as (16) withR= 1 andQ=100.The effectiveness of the proposed algorithms will be validated when time-delay attacks occur in different channels.

    A.The case of time-delay attacks in the S-C channel

    The time-delay attacks occur in the S-C channel,and there are attack-induced delays in the output.The initial stabilizing controller gain is chosen as

    Afterk= 80, ?K25is applied to the system,the trajectories of the system output and the reference are depicted in Fig.3.It is shown that the output tracks the reference signal asymptotically, which accords with the theoretical results in this paper.

    Fig.3 Case of time-delay attacks in the S-C channel

    Fig.4 Case of time-delay attacks in the C-A channel

    B.The case of time-delay attacks in the C-A channel

    If time-delay attacks occur in the C-A channel,there will be attack-induced delays in the input.Algorithm2 is implemented,and the initial controller gain is chosen arbitrarily as follows:

    C.Performance comparison

    Fig.5 Exploration noise

    Fig. 6 Case of time-delay attacks in two channels with compared method

    It is seen from the above simulations that the designed controller can achieve the adaptive output regulation in the presence of time-delay attacks. In fact, the case A in this paper was studied in [25], where the delay in one channel was addressed. The attack-induced delays in two channels are studied in this paper,and the maximum delays in different channels may not be the same.If the method of dealing with one-channel delay is applied to the system where twochannels suffer from adversary attacks, the system may be unstable,even be crashed.It is known that the dimensions of the designed controllers are different when the system with two-channel delays or one-channel delays.In the simulation,this fact has been illustrated by Fig.6. Before updating the controller,the relative data are collected along the system trajectory.When the learned measurement feedback controller is applied to the system without considering the delay in the S-C channel,the system trajectory will be far away from the reference signal.Hence,the learned controller with the case of input delay cannot stabilize the system with two-channel delays.

    When the C-A channel and the S-C channel both suffer from time-delay attacks unfortunately,the measurement feedback controller in this paper will be employed,and Algorithm2 will be used to test the system performance.Choose an arbitrary initial controller gain as follows:

    Fig.7 Case of time-delay attacks in two channels with our method

    Then,the approximate optimal controller gain is learned after 40 iterations

    Afterk= 120, ?K40is applied to the system, Fig.7 shows the trajectories of the system output and the reference signal.Compared with Fig.6,it is clear that the trajectory changes dramatically after updating the controller.Fig.7 shows that the approximate optimal control policy can stabilize the system and make the system output track the reference signal asymptotically,which is as expected for the designed control method in this paper.

    5 Conclusions

    This paper studied the adaptive output problem for unknown CPSs under time-delay attacks which occur in the S-C channel and the C-A channel.Historical control inputs and tracking errors were used to design the measurement feedback controller, which could ensure the system to achieve the real-time closed-loop feedback control, even though the current measurements could be delayed due to timedelay attacks.The measurement feedback controller gain was calculated and updated online through solving the ARE iteratively with the RL method, and the system could achieve the asymptotic tracking and disturbance rejection. Simulation results on a mass–spring–damper system demonstrated the effectiveness of the proposed method.In the future,the proposed method can be extended to the cooperative output regulation with set-point attacks,secure control with attack detection.

    Acknowledgements This work was supported by the National Natural Science Foundation of China(Nos.61973277, 62073292) and in part by the Zhejiang Provincial Natural Science Foundation of China(No.LR20F030004).

    在线观看国产h片| 三级国产精品片| 国产亚洲一区二区精品| 性色av一级| 亚洲av不卡在线观看| 亚洲精品一区蜜桃| 久久精品国产亚洲av天美| av在线老鸭窝| 国产日韩欧美亚洲二区| 成人综合一区亚洲| 久久婷婷青草| 中国美白少妇内射xxxbb| 看免费成人av毛片| 色网站视频免费| 亚洲国产精品一区二区三区在线| 永久免费av网站大全| 久久热精品热| 欧美精品一区二区免费开放| 精品一区二区免费观看| 亚洲国产欧美在线一区| 亚洲国产精品一区三区| 日日摸夜夜添夜夜爱| 成人无遮挡网站| 男人爽女人下面视频在线观看| 亚洲精品成人av观看孕妇| 免费看av在线观看网站| 国产91av在线免费观看| 久久久国产欧美日韩av| 大又大粗又爽又黄少妇毛片口| 午夜视频国产福利| 人妻一区二区av| 亚洲性久久影院| 精品久久国产蜜桃| 国产精品免费大片| 狂野欧美激情性xxxx在线观看| 久久久久久久精品精品| 能在线免费看毛片的网站| 老司机影院成人| a级毛色黄片| 乱人伦中国视频| 日韩精品免费视频一区二区三区 | 亚洲国产av新网站| 精品久久久久久久久av| 亚洲av电影在线观看一区二区三区| 视频中文字幕在线观看| 国精品久久久久久国模美| 久久国内精品自在自线图片| 狂野欧美激情性bbbbbb| 嘟嘟电影网在线观看| 免费看日本二区| 乱码一卡2卡4卡精品| 人妻 亚洲 视频| 亚洲欧美日韩东京热| 欧美日韩一区二区视频在线观看视频在线| 亚洲激情五月婷婷啪啪| 精品国产乱码久久久久久小说| 日日撸夜夜添| 亚洲精品色激情综合| 久久ye,这里只有精品| 91精品伊人久久大香线蕉| 精品久久久精品久久久| 简卡轻食公司| 麻豆精品久久久久久蜜桃| 久久久久久人妻| 一级毛片aaaaaa免费看小| 亚洲欧美日韩东京热| 亚洲欧美一区二区三区黑人 | 久久久精品94久久精品| 黄色毛片三级朝国网站 | 两个人的视频大全免费| 91aial.com中文字幕在线观看| 亚洲av男天堂| 久久综合国产亚洲精品| 99久久综合免费| 51国产日韩欧美| 中文字幕亚洲精品专区| 一级毛片aaaaaa免费看小| 国产白丝娇喘喷水9色精品| 精品人妻偷拍中文字幕| 又大又黄又爽视频免费| 亚洲精品国产成人久久av| 美女内射精品一级片tv| 久久精品夜色国产| 久久久久久久久久久丰满| 18+在线观看网站| 少妇高潮的动态图| 久久久亚洲精品成人影院| 日韩伦理黄色片| 精品久久国产蜜桃| 好男人视频免费观看在线| 99热全是精品| av在线老鸭窝| 少妇高潮的动态图| 亚洲精品自拍成人| 精品一区二区免费观看| 日韩强制内射视频| av卡一久久| 秋霞在线观看毛片| 国产日韩欧美亚洲二区| 亚洲国产精品999| 夜夜看夜夜爽夜夜摸| 国产精品无大码| 777米奇影视久久| 久久 成人 亚洲| 狂野欧美激情性bbbbbb| 涩涩av久久男人的天堂| 亚洲国产精品999| 三级国产精品欧美在线观看| 日本wwww免费看| 狂野欧美激情性xxxx在线观看| 国语对白做爰xxxⅹ性视频网站| 国产亚洲一区二区精品| 日本欧美视频一区| 国产成人精品福利久久| 欧美三级亚洲精品| 3wmmmm亚洲av在线观看| 丰满乱子伦码专区| 国产在视频线精品| 欧美 日韩 精品 国产| 成人午夜精彩视频在线观看| 亚洲成色77777| 汤姆久久久久久久影院中文字幕| 欧美日韩精品成人综合77777| 国产成人精品婷婷| 99久久综合免费| 免费看av在线观看网站| 国产免费又黄又爽又色| 五月开心婷婷网| 国产精品福利在线免费观看| 大片电影免费在线观看免费| 91精品国产国语对白视频| 精品人妻熟女av久视频| 成年av动漫网址| 国产精品国产av在线观看| 亚洲成人av在线免费| 国产精品成人在线| 啦啦啦在线观看免费高清www| 日日爽夜夜爽网站| 欧美日韩av久久| av黄色大香蕉| 日韩,欧美,国产一区二区三区| 久久久久久久久久久久大奶| 在线天堂最新版资源| 最新的欧美精品一区二区| av又黄又爽大尺度在线免费看| 少妇猛男粗大的猛烈进出视频| 色婷婷久久久亚洲欧美| 嘟嘟电影网在线观看| 久久毛片免费看一区二区三区| 国产有黄有色有爽视频| 美女主播在线视频| 黑人猛操日本美女一级片| 一本久久精品| 久久久久久人妻| 蜜桃在线观看..| 91久久精品电影网| 亚洲精品色激情综合| videossex国产| 中文字幕制服av| 尾随美女入室| a级毛片在线看网站| 亚洲av.av天堂| 高清不卡的av网站| 另类精品久久| 18+在线观看网站| 亚洲精品aⅴ在线观看| 成人国产av品久久久| 成人综合一区亚洲| 国产精品久久久久久久电影| 久久精品久久久久久噜噜老黄| 国产日韩一区二区三区精品不卡 | 啦啦啦视频在线资源免费观看| 久久精品国产亚洲网站| 国产色婷婷99| 九九在线视频观看精品| 亚洲av日韩在线播放| 亚洲真实伦在线观看| 少妇丰满av| 日韩中文字幕视频在线看片| 99九九在线精品视频 | 看非洲黑人一级黄片| 免费大片18禁| 免费在线观看成人毛片| 中文字幕久久专区| 欧美xxⅹ黑人| 亚洲精品乱久久久久久| 18禁在线无遮挡免费观看视频| 晚上一个人看的免费电影| 亚洲无线观看免费| 午夜日本视频在线| √禁漫天堂资源中文www| 热99国产精品久久久久久7| 涩涩av久久男人的天堂| 老司机影院毛片| 99热国产这里只有精品6| 91久久精品国产一区二区成人| 熟女人妻精品中文字幕| 国产免费又黄又爽又色| 夜夜看夜夜爽夜夜摸| 亚洲av.av天堂| 午夜91福利影院| 久久精品国产a三级三级三级| 欧美日本中文国产一区发布| 91aial.com中文字幕在线观看| 成人18禁高潮啪啪吃奶动态图 | 国产成人a∨麻豆精品| 久久久久久久国产电影| 亚洲国产日韩一区二区| 欧美精品一区二区免费开放| 亚洲国产精品一区三区| 亚洲国产色片| 国产淫语在线视频| 永久免费av网站大全| 国产亚洲欧美精品永久| 国产精品熟女久久久久浪| 一级爰片在线观看| 在线天堂最新版资源| 美女国产视频在线观看| 啦啦啦视频在线资源免费观看| 亚洲成人一二三区av| 18+在线观看网站| 午夜福利网站1000一区二区三区| 97超视频在线观看视频| 午夜福利影视在线免费观看| 狂野欧美白嫩少妇大欣赏| 日韩欧美一区视频在线观看 | 99久国产av精品国产电影| 一级爰片在线观看| 男女免费视频国产| 国产成人精品婷婷| 五月天丁香电影| 新久久久久国产一级毛片| 国产精品久久久久久久电影| 亚洲精品乱久久久久久| 在现免费观看毛片| 免费人成在线观看视频色| 免费观看av网站的网址| 亚洲国产欧美在线一区| 国产淫片久久久久久久久| 久久狼人影院| 国内少妇人妻偷人精品xxx网站| 男女国产视频网站| 免费在线观看成人毛片| 麻豆成人av视频| 亚洲精品日韩av片在线观看| 国产黄片视频在线免费观看| 女的被弄到高潮叫床怎么办| 亚洲欧美日韩东京热| 又大又黄又爽视频免费| 好男人视频免费观看在线| 中文在线观看免费www的网站| 国产成人精品久久久久久| 我要看日韩黄色一级片| 男人狂女人下面高潮的视频| 99re6热这里在线精品视频| 一区在线观看完整版| 日日摸夜夜添夜夜爱| 老熟女久久久| .国产精品久久| 一本—道久久a久久精品蜜桃钙片| 99久国产av精品国产电影| 亚洲丝袜综合中文字幕| 秋霞伦理黄片| 婷婷色麻豆天堂久久| 亚洲av电影在线观看一区二区三区| 欧美丝袜亚洲另类| av有码第一页| 一级毛片 在线播放| 男人爽女人下面视频在线观看| 午夜免费男女啪啪视频观看| 婷婷色麻豆天堂久久| 在线观看美女被高潮喷水网站| 中文字幕制服av| 黑丝袜美女国产一区| 国产成人精品婷婷| 午夜激情福利司机影院| 色5月婷婷丁香| 久久精品国产自在天天线| av国产久精品久网站免费入址| 一个人免费看片子| 伊人亚洲综合成人网| 一级二级三级毛片免费看| 嘟嘟电影网在线观看| 久久女婷五月综合色啪小说| 亚洲一级一片aⅴ在线观看| a 毛片基地| 国产又色又爽无遮挡免| 久久久午夜欧美精品| 午夜免费鲁丝| 久久精品国产a三级三级三级| 欧美xxⅹ黑人| 欧美少妇被猛烈插入视频| 免费看av在线观看网站| 亚洲av二区三区四区| 亚州av有码| 少妇人妻精品综合一区二区| 国产在线视频一区二区| 极品人妻少妇av视频| 成年人午夜在线观看视频| 午夜免费男女啪啪视频观看| 国产 一区精品| 六月丁香七月| av专区在线播放| av在线观看视频网站免费| 嫩草影院新地址| 三上悠亚av全集在线观看 | 在线观看国产h片| 99热这里只有精品一区| 夜夜看夜夜爽夜夜摸| 噜噜噜噜噜久久久久久91| 国产欧美日韩一区二区三区在线 | 久久午夜综合久久蜜桃| 蜜桃在线观看..| 精品久久国产蜜桃| 青春草视频在线免费观看| 最近最新中文字幕免费大全7| 99热这里只有精品一区| 又大又黄又爽视频免费| 亚洲不卡免费看| 日韩中字成人| 最近手机中文字幕大全| 国产日韩欧美视频二区| 午夜91福利影院| 久久精品国产亚洲av天美| 亚洲国产精品一区二区三区在线| 亚洲欧洲日产国产| 热re99久久精品国产66热6| 黑丝袜美女国产一区| 一本色道久久久久久精品综合| 亚洲国产色片| 看免费成人av毛片| 黑人高潮一二区| 下体分泌物呈黄色| 日韩,欧美,国产一区二区三区| 亚州av有码| 丰满饥渴人妻一区二区三| 免费av不卡在线播放| 多毛熟女@视频| 亚洲av不卡在线观看| 欧美精品一区二区免费开放| 亚洲精品中文字幕在线视频 | 欧美国产精品一级二级三级 | 日韩成人av中文字幕在线观看| 91精品一卡2卡3卡4卡| 黑人猛操日本美女一级片| 美女中出高潮动态图| xxx大片免费视频| 午夜影院在线不卡| 2018国产大陆天天弄谢| 人妻 亚洲 视频| 精品久久国产蜜桃| 国产淫语在线视频| 丰满乱子伦码专区| a级片在线免费高清观看视频| av一本久久久久| 成人午夜精彩视频在线观看| av天堂久久9| 18+在线观看网站| 国产亚洲最大av| 人妻 亚洲 视频| 久久久国产一区二区| 九九爱精品视频在线观看| freevideosex欧美| 午夜福利影视在线免费观看| 中国美白少妇内射xxxbb| 18禁裸乳无遮挡动漫免费视频| 亚洲欧美日韩另类电影网站| 亚洲成人av在线免费| 国产男女内射视频| 中文字幕亚洲精品专区| 汤姆久久久久久久影院中文字幕| 欧美 亚洲 国产 日韩一| 91精品一卡2卡3卡4卡| 免费播放大片免费观看视频在线观看| 99久国产av精品国产电影| 97超碰精品成人国产| 少妇人妻 视频| 五月天丁香电影| 五月开心婷婷网| 亚洲精品国产成人久久av| 国产在线一区二区三区精| 免费高清在线观看视频在线观看| av国产久精品久网站免费入址| 久久亚洲国产成人精品v| 日本猛色少妇xxxxx猛交久久| 久久精品熟女亚洲av麻豆精品| 亚洲av福利一区| 美女中出高潮动态图| 国产精品免费大片| 亚洲精品一二三| 在线观看国产h片| 伦精品一区二区三区| 嫩草影院新地址| www.av在线官网国产| 黄色毛片三级朝国网站 | 一本一本综合久久| 亚洲激情五月婷婷啪啪| 啦啦啦啦在线视频资源| 久久精品久久久久久噜噜老黄| 九九爱精品视频在线观看| 日本vs欧美在线观看视频 | 久久久久人妻精品一区果冻| 在线精品无人区一区二区三| 久久国产亚洲av麻豆专区| 日韩熟女老妇一区二区性免费视频| 亚洲高清免费不卡视频| 全区人妻精品视频| 男人爽女人下面视频在线观看| 美女大奶头黄色视频| 少妇 在线观看| 男女啪啪激烈高潮av片| 另类精品久久| 国产一区二区在线观看av| 久久久国产欧美日韩av| 亚洲欧洲日产国产| 成人综合一区亚洲| 99久久精品热视频| 热re99久久精品国产66热6| 国产高清不卡午夜福利| 黑人猛操日本美女一级片| 丝瓜视频免费看黄片| 久久青草综合色| 赤兔流量卡办理| 日日撸夜夜添| 国产亚洲一区二区精品| 成人毛片a级毛片在线播放| 欧美日韩国产mv在线观看视频| 免费大片黄手机在线观看| 久久ye,这里只有精品| 亚洲第一av免费看| www.色视频.com| 特大巨黑吊av在线直播| 街头女战士在线观看网站| 一级av片app| 日韩精品有码人妻一区| 一个人免费看片子| 激情五月婷婷亚洲| 看免费成人av毛片| 春色校园在线视频观看| 两个人的视频大全免费| 99热6这里只有精品| 成人黄色视频免费在线看| 三上悠亚av全集在线观看 | 免费人成在线观看视频色| 国产高清国产精品国产三级| 黄色配什么色好看| 国语对白做爰xxxⅹ性视频网站| 国产精品一区二区性色av| 国产中年淑女户外野战色| av播播在线观看一区| 精品99又大又爽又粗少妇毛片| 精品久久久久久电影网| 亚洲丝袜综合中文字幕| 观看美女的网站| 波野结衣二区三区在线| 久久久久网色| 国产真实伦视频高清在线观看| 三上悠亚av全集在线观看 | 亚洲欧美成人精品一区二区| 久久6这里有精品| 全区人妻精品视频| 亚洲欧美日韩另类电影网站| 久久精品久久久久久噜噜老黄| 久久久a久久爽久久v久久| 国产精品欧美亚洲77777| 99国产精品免费福利视频| 亚洲婷婷狠狠爱综合网| 欧美精品人与动牲交sv欧美| 91精品国产九色| 桃花免费在线播放| 久久久欧美国产精品| 国产高清有码在线观看视频| 亚洲第一区二区三区不卡| 亚洲欧美日韩另类电影网站| av免费在线看不卡| 国产在线一区二区三区精| 大片电影免费在线观看免费| 人人妻人人爽人人添夜夜欢视频 | 欧美人与善性xxx| 大片免费播放器 马上看| 人妻夜夜爽99麻豆av| 久久99热6这里只有精品| 久久99精品国语久久久| av线在线观看网站| 国产亚洲欧美精品永久| 一级爰片在线观看| 人人澡人人妻人| 99re6热这里在线精品视频| av一本久久久久| 国产在线免费精品| 国产片特级美女逼逼视频| 午夜日本视频在线| 欧美成人午夜免费资源| 丰满人妻一区二区三区视频av| 国产成人精品一,二区| 国产高清国产精品国产三级| 日韩,欧美,国产一区二区三区| 国产免费一区二区三区四区乱码| 久久久亚洲精品成人影院| 亚洲国产成人一精品久久久| xxx大片免费视频| 久久av网站| 国产免费一区二区三区四区乱码| 久久免费观看电影| 久久久久久人妻| 一边亲一边摸免费视频| 中文资源天堂在线| 性色avwww在线观看| 男女啪啪激烈高潮av片| 九九爱精品视频在线观看| 免费久久久久久久精品成人欧美视频 | 亚洲欧美精品专区久久| 99热这里只有精品一区| 黑人高潮一二区| 99久久精品一区二区三区| 久久青草综合色| 国产精品久久久久久久电影| 国产精品一二三区在线看| 少妇人妻久久综合中文| av视频免费观看在线观看| 午夜福利视频精品| 欧美精品人与动牲交sv欧美| 妹子高潮喷水视频| 久久久久久伊人网av| 秋霞伦理黄片| 美女福利国产在线| 男的添女的下面高潮视频| 国产欧美日韩一区二区三区在线 | 亚洲国产精品一区三区| 精品国产露脸久久av麻豆| 97精品久久久久久久久久精品| 最新中文字幕久久久久| 午夜免费观看性视频| 国产成人免费无遮挡视频| 交换朋友夫妻互换小说| 99热这里只有精品一区| 黑人猛操日本美女一级片| 亚洲,欧美,日韩| 日日爽夜夜爽网站| 亚洲成人av在线免费| 99久久精品国产国产毛片| 午夜福利在线观看免费完整高清在| 美女cb高潮喷水在线观看| 国产精品久久久久久久电影| 高清欧美精品videossex| 三级国产精品欧美在线观看| 日本欧美国产在线视频| 国产精品一区二区性色av| 国产片特级美女逼逼视频| 91久久精品电影网| 少妇 在线观看| 自拍偷自拍亚洲精品老妇| 免费看av在线观看网站| 日韩伦理黄色片| 中文字幕人妻熟人妻熟丝袜美| 亚州av有码| 亚洲丝袜综合中文字幕| 在线观看国产h片| 国产精品99久久久久久久久| 亚洲综合精品二区| 黄片无遮挡物在线观看| 欧美精品高潮呻吟av久久| 最近中文字幕高清免费大全6| 纵有疾风起免费观看全集完整版| 中文字幕免费在线视频6| 国产精品三级大全| 亚洲成人av在线免费| 国产69精品久久久久777片| 五月玫瑰六月丁香| 岛国毛片在线播放| 少妇人妻精品综合一区二区| 最近最新中文字幕免费大全7| 亚洲久久久国产精品| 成年人午夜在线观看视频| 成人国产麻豆网| 日韩在线高清观看一区二区三区| 春色校园在线视频观看| av免费观看日本| 久热这里只有精品99| 国模一区二区三区四区视频| 街头女战士在线观看网站| 中文字幕久久专区| av卡一久久| 国产精品偷伦视频观看了| 亚洲第一av免费看| 91精品国产国语对白视频| 汤姆久久久久久久影院中文字幕| 99热这里只有是精品50| 一二三四中文在线观看免费高清| 亚洲av国产av综合av卡| 国产一区有黄有色的免费视频| 国精品久久久久久国模美| 亚洲精品视频女| 亚洲国产毛片av蜜桃av| 青青草视频在线视频观看| 国产女主播在线喷水免费视频网站| 国产深夜福利视频在线观看| 一级二级三级毛片免费看| 国产免费一级a男人的天堂| av线在线观看网站| 在线观看美女被高潮喷水网站| 日韩欧美 国产精品| 又爽又黄a免费视频| 日本av手机在线免费观看| 美女大奶头黄色视频| videos熟女内射| 久久97久久精品| 2022亚洲国产成人精品| 黄色欧美视频在线观看| 亚洲高清免费不卡视频| 国产一区二区三区av在线| 人妻 亚洲 视频| 高清欧美精品videossex| 免费播放大片免费观看视频在线观看| 尾随美女入室|